How to be Nobody

"Cyclops, you asked my noble name, and I will tell it; but do you give the stranger's gift, just as you promised. My name is Nobody. Nobody I am called by mother, father, and by all my comrades." - Homer, Odyssey

Foreward

In the age of information, it is easy to know exactly who someone is just by looking online for the average person. Imagine how easy it is for organizations to know about individuals who have the funding, technology, and reason to find out who opposes them to get even more information than what the average person has access to. Your name, address, political leanings, current location, and more are actively available for those organizations.
This site is dedicated to giving the average person a fighting chance to be Nobody and stay out of the eye of Polyphemus. There are endless things you can do to secure your personal data and communications, but know this is a war that is constantly evolving and changing. A security measure you enact today could be broken through tomorrow at no fault of your own. Once you start to know and learn more, the more you can implement for your own safety, but the more you will become disgusted and afraid of what is considered normal.
Steps to take on this site are listed in order of complexity you can take, always start with the first thing then move down and build off of what you have learned rolling out each measure. With every step in mind, know that to truly be Nobody, you still need to appear as Somebody, just like everyone else. Extreme measures on either side are only detrimental for you as an individual.
Shh, and keep yourself safe.


# 10 Things to Know


10 General Tips

    Turn off biometric entry into your phone and enable a PIN to access.
    Uninstall social media apps from your phone, as they are able to capture phone data and send it back to the service. Utilize social media via a web browser if necessary.
    Avoid using AI that is hosted by a large company. They have access to everything that you do with the AI and help to build up a profile about you.
    Utilize an encrypted and trusted password manager. This will ensure unwanted access to your accounts is much more difficult. Options include Bitwarden, 1Password, and if you want to self-host, KeePassXC.
    When sharing files online, make sure you remove the metadata using online tools or disabling the metadata collection from within your camera app.
    Move yourself and your friends over to a secure messaging platform. A current recommendation is Signal. Do not use WhatsApp or Discord to discuss organizing plans that are critical and not being shared publically.
    Move to an encrypted email. Options include Proton Mail, Tutta, CounterMail, and Mailfence. Do your own research on their security practices before committing. Generally, European companies are able to offer more secure platforms than American companies.
    Utilize a secure, no log, and trusted VPN. A VPN is not a tool that will make everything you do encrypted. All it does is hide what you are trying to access on the internet from your ISP and local network. Nobody has used Mullvad and Proton VPN and recommends either of them. Do your own research on their security practices before committing.
    When in hostile territories, turn on airplane mode whenever possible or turn your phone off completely.
    Commit to a balancing act of doing some things regularly without all of your security measures, to ensure that you have the same amount of data leaking from you as Somebody. This might mean accessing social media on a second device, browsing certain websites without a VPN on, or sending texts/calling phones with normal and regular conversations.

How does Polyphemus track you?

They use a variety of tricks and tools, as well as brute force and intimidation. DO NOT BE INTIMIDATED, BUT BE AWARE.

    Stingray Trackers - A way for them to connect your phone and see all unencrypted data before it goes to the phone tower. They without a doubt can see location, phone model, and IMSI number (a number that is unique to your phone and cell provider).
    Flock Cameras - A network of cameras that are analyzing and monitoring cars and individuals that are posted up in neighborhoods across the country. On top of being available to them, these devices are easily accessible. For more information, watch this video from Benn Jordan: youtu.be/uB0gr7Fh6lY
    AI Recognition - By taking photos and videos of individuals, they are able to identify you based on multiple sources (like Flock Cameras). This includes identifying you by your face, voice, and even the way you walk. If you deem it necessary, find ways to counteract these measures.

Things you should look into


Other Sources


Contact Nobody

Have more information that Nobody should know? Send a message to whois@nobody.sh

-----BEGIN PUBLIC KEY----- MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAjDXkOcmQpLxiGyJSkryF /UECX640xQqlrW+rhPqGFD7ZrJilthklhR/cGZY8JtvmvYkxkbA8sJkikNmMEWV/ tVHQ18cuSsVEfdlmkLP6HnwOSPlrfW6Hx1JEU/idRB+RlysmpLCgv5PtYOCB6XLn RLznuON63YEXOc8Vy1CVOvGAI2/RMCsgcUQfvnr4PkNlV82t9b0EHt0blRKNNrXK 32qZqZls9wNbgd3g52zcRsh9NZQsbvUFEW+IzU/DKv+wuwqGadS9S8rniRpYqk2X vZM1dkeH97PGpqNNoVvhwxjO6CmwMEHVlYplWDPxbdaL0anVCIXhwbxuxch8P6N5 YwIDAQAB -----END PUBLIC KEY-----